Risk Assessment of Computer Network Security in Banks
|
|
- Gwenda Thompson
- 7 years ago
- Views:
Transcription
1 , pp Risk Assessment of Computer Network Security in Banks Tan Juan Weifang University of Science and Technology, Shandong, Shouguang, Abstract The importance of computer system security of banks can never be exaggerated. Conducting risk assessment of computer system security of banks can increase safety management and ensure normal operation. This paper firstly figures out risk assessment indexes for computer system security of banks through literature review and survey. Secondly, it uses AHP to confirm the weight of indicators and establishes five security levels. According to the judgment of experts, it finally establishes the risk assessment model for computer system security of banks. Keywords: computer; AHP; weight; risk assessment; fuzzy evaluation 1. Introduction Banks are an integral part of state-owned enterprises. With the development of computer network and the expansion of trading channel of banks, online services become more and more open and banks have experienced continuous upgrading. The computer network is placed a priority in banks. However, the computer network is easy to be attacked by viruses and Hackers. A damaged network will cause dire consequences and hit the bank greatly. Therefore, risk assessment of computer system security of banks can detect loop-holes in advance and warn the bank to increase the security level of computer network, ensuring that the bank is operated in a normal state. In response to the facts that the computer network of banks has multiple trading channels, the system is quite open and system data can be concentrated, banks and the government have followed closely network security. This paper intends to assess the computer system security of banks, makes reasonable warning of the security and establishes an appraisal model of computer system security of banks. In recent years, security loopholes loom large. For example, deposit is missing for no reasons and bank credit card becomes invalid. All these worry people a lot. Many banks recruited professionals to assess the computer network security in order to avoid unnecessary losses. Thus, it is important to conduct risk assessment of computer system security of banks, as it can increase the security level of banks, guarantees normal operation maintains bank s reputation and promotes a normal and stable life. Computer system security of banks has been studied many times. There are research results relevant to this topic on National Knowledge Infrastructure and relevant to risk assessment of computer system security of banks. 2. Evaluation Indicator System for Computer System Security of Banks Based on the questionnaires to Rural Commercial Bank, Agricultural Bank of China and China Construction Bank and relevant literature review, and according to the operation of computer network of banks (TCP/IP Internet model is adopted), there are four layers of evaluation indexes for the computer system security of banks, namely the ISSN: IJSIA Copyright c 2016 SERSC
2 physical layer, the network layer, the data layer and the layer. Each layer contains several second level evaluation indexes, as shown in Table 1. Table 1. Risk Assessment System for Computer System Security of Bank P first level evaluation index physical layerp 1 network layerp 2 data layerp 3 second level evaluation index computer hardware P 11 ; computer network facilitiesp 12 ;wiring system P 13 ;bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; layerp 4 response P 41 ; measurep 42 ; recovery P 43 ; 3. Index Weight of Computer System Security of Banks AHP is used to confirm the index weight of computer system security of banks. Firstly, the layer structure of computer system security of banks is established to do the assessment, as shown in Figure.1. Figure 1. Evaluation System Structure for Computer System Security of Banks Secondly, the 1-9 scale is used to construct the comparative judgment of all indexes. The comparative judgment is established by comparing the influence of indexes of the sub-layer on that of the dominant-layer. The influence is confirmed according to experts judgment. 2 Copyright c 2016 SERSC
3 Scale a ij Table Value of Scale Mark Comparison results between index I and index j 1 same influence of index i and index j 3 the influence of index i is a bit stronger than index j 5 the influence of index i is stronger than index j 7 the influence of index i is much stronger than index j 9 the influence of index i is absolutely stronger than index j 2,4,6,8 1 1,, 2 9 The comparative influence of index i and index j lies in between 1,3,5 and 9 The comparative influence of index i and index j is the interval number of a ij Thirdly, use the geometric method to calculate the weight of indexes (1) Compute the product of elements in each line in the comparative judgment and get vector ; (2) (2)Subject vector to extraction and get vector ; (3) Normalize vector and get the corresponding weight vector. Finally, subject the comparative judgment to consistency test with the following two steps. ar n ij j max n 1 j1 CI max (1) Compute the consistency index n 1 n i1 ri, where. CI CR (2) Compute the consistency radio RI, where RI refers to random consistency index. Its value is shown in Table 3. Table 3. Random Consistency Indexes n n RI Neutrally, when 0.10 CR, subject the comparative judgment to consistency test. Use AHP to calculate the index weight of computer system security of banks: Copyright c 2016 SERSC 3
4 Table 4. Comparison Matrix and Test Results of the First Level Evaluation Indexes Relative to the Target Layer Target layer computer system security of banks P maximum consistency first level evaluation index physical network data weight eigenvalue ratio layerp 1 layerp 2 layerp 3 layerp 4 physical layer P 1 1 1/6 1/ network layer P data layer P 3 3 1/ layer P 4 1/5 1/9 1/ Table 5. Comparison Matrix and Test Results of the Second Level Evaluation Indexes Relative to the First Level Evaluation Indexes first level evaluation index physical layerp 1 computer computer wiring bank maximum consistency second level evaluation index hardware network system staff weight eigenvalue ratio P 11 facilitiesp 12 P 13 P 14 computer hardware P /5 1/3 1/ computer network facilitiesp wiring system P /3 1 1/ bank staff P / Table 6. Comparison Matrix and Test Results of the Second Level Evaluation Index Relative to the Network Layer Indexes P2 first level evaluation index network layerp 2 second level evaluation index firewall P 21 alarm vulnerability system detection P 22 P 23 safety maximum certificate system weight eigenvalue validation P 24 firewall P / vulnerability detection P 22 1/5 1 1/3 1/8 1/ alarm system P 23 1/ /7 1/ safety system P certificate validation P 25 1/ / Table 7. Comparison Matrix and Test Results of the Second Level Evaluation Index Relative to the First Level Data Layer Indexes P3 P 25 consistency ratio first level evaluation index data layerp 3 data data data identity log maximum consistency second level evaluation index detection transmission backup recognition auditing weight eigenvalue ratio P 31 P 32 data detection P data transmission P 32 1/ /3 1/ data backup P 33 1/9 1/5 1 1/6 1/ identity recognition P 34 1/ log auditing P 35 1/ / P 33 P 34 P Copyright c 2016 SERSC
5 Table 8. Comparison Matrix and Test Results of the Second Level Evaluation Index Relative to the First Level Emergency Layer Indexes P4 first level evaluation index layerp 4 second level evaluation index response P 41 measurep 42 recovery response P /6 1/ measurep recovery P / P 43 maximum weight eigenvalue consistency ratio As CR is smaller than 0.10, P, P1, P2, P3, P4all pass the consistency test. The index weight of computer system security of banks is concluded as in Table 9. Table 9. The Index Weight of Computer System Security of Banks first level evaluation index weight second level evaluation index weight computer hardware P 11 ; physical layerp computer network facilitiesp 12 ; wiring system P 13 ; bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; network layerp alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data layerp data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; layerp measurep 42 ; recovery P 43 ; Risk Assessment Model for Computer System Security of Banks Risks of computer system security of banks are categorized into five levels: very safe, relatively safe, neutral, relatively dangerous and very dangerous. Establish risk assessment model for computer system security of banks. Establishing the risk assessment set The risk assessment set is shown in Table 10. Table 10. Risk Assessment Set for Computer System Security of Banks second level evaluation index computer hardware P 11 ; Security level Copyright c 2016 SERSC 5
6 computer network facilitiesp 12 ; wiring system P 13 ; bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; measurep 42 ; recovery P 43 ; (2) Confirm the fuzzy evaluation judgment Expert judgment method is employed to confirm the judgment matrix. Suppose the judgment result of the i-thsecond level evaluation index in the first level evaluation (1) (1) (1) (1) (1) indexp1is ri 1 ri 2 ri 3 ri 4 r i5, where i 1,2,3,. 4 The fuzzy evaluation judgment of second level evaluation index is: 6 Copyright c 2016 SERSC
7 R r r r r r (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) r21 r22 r23 r24 r25 1 (1) (1) (1) (1) (1) r31 r32 r33 r34 r35 (1) (1) (1) (1) (1) r41 r42 r43 r44 r45 Where r ij the number of experts who rate j-class/ total number of experts. Similarly: r r r r r (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) r21 r22 r23 r24 r25 (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) r41 r42 r43 r44 r45 (2) (2) (2) (2) (2) r51 r52 r53 r54 r55 R r r r r r r r r r r r r r r r R r r r r r r r r r r r r r r r R (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) r r r r r r r r r r r r r r r (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) (4) According to the weight of second level evaluation index, compute the fuzzy evaluation judgment of the first level evaluation index: R r T 1 R T T T 1 r2 R2 r3 R3 r4 R 4, Then, according to the weight of the first level evaluation index, compute the risk assessment vector of the computer system security of banks: T w r R According to the maximum principle, the highest risk is the class in which the computer network is categorized. 5. Model Application-Risk Assessment of a Certain Computer System Security of Banks A state-owned bank was subject to risk assessment. A team of 20 experts was asked to score 17 second level evaluation indexes of the computer system security. The judgment results are shown in Table 11.,,, Table 11. Expert Assessment of a Computer System Security of a Domestic Bank second level evaluation index. Assessment result computer hardware P 11 ; computer network facilitiesp 12 ; wiring system P 13 ; Copyright c 2016 SERSC 7
8 bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; measurep 42 ; recovery P 43 ; Subject the results to data processing, as shown in Table 12. Table 12. Assessment Results after Data Processing second level evaluation index Assessment results after data processing computer hardware P 11 ; computer network facilitiesp 12 ; wiring system P 13 ; bank staff P 14 ; firewall P 21 ; vulnerability detection P 22 ; alarm system P 23 ; safety system P 24 ; certificate validation P 25 ; data detection P 31 ; data transmission P 32 ; data backup P 33 ; identity recognition P 34 ; log auditing P 35 ; response P 41 ; Copyright c 2016 SERSC
9 measurep 42 ; recovery P 43 ; Use MATLB (in the Appendix) to compute the judgment vector of risk assessment of the computer system security of banks: w According to the maximum principle, it is found that the computer system security of banks is very safe. Conclusion In response to the media report of loops holes in bank s system and to the credit crisis of banks, banks should enhance security management of its computer system and increase the safety level. Priority should be given to risk assessment of computer system security, so as to ensure a normal operation of bank s business. Appendix: MATLB program a=load ('yhjsjwlaq.txt'); w= [ ]; w1= [0.0736, , , ]; w2= [0.1815, , , , ]; w3= [0.4901, , , , ]; w4= [0.0915, , ]; b (1,:)=w1*a([1:4],:); b (2,:)=w2*a([5:9],:); b (3,:)=w3*a([10:14],:); b (4,:)=w4*a([15:end],:); c=w*b c = References [1] M. Ali Aydın, A. Halim Zaim, K. Gökhan Ceylan. A hybrid intrusion detection system design for computer network security [J]. Computers and Electrical Engineering, vol.35, no. 3, (2009), pp [2] J M. Estévez-Tapiador, ı -Teodoro,. ı z-verdejo. NSDF: a computer network system description framework and its application to network security [J]. Computer Networks, vol.43, no. 5, (2003), pp [3] S Zhang. A model for evaluating computer network security systems with 2-tuple linguistic information [J]. Computers and Mathematics with Applications, vol.62, no. 4, (2011), pp [4] R Lübben, M Fidler, J Liebeherr, Stochastic bandwidth estimation in networks with random service [J], IEEE/ACM Transactions on Networking (TON), vol.22, no. 2, (2014), pp [5] T J. Rothwell. Job applications and network security, or, how to not limit the online applicant pool [J]. Ubiquity, (2003) (April), pp.2-2. Copyright c 2016 SERSC 9
10 [6] G B. White, E A. Fisch, U W. Pooch. Computer System and Network Security. EDPACS, vol.25, no. 8, (1998). [7] G Gercek, N Saleem, Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions, Information Security Journal: A Global Perspective, vol.14, no. 3, (2005). [8] Y-K Lin, C-L Pan. Considering retransmission mechanism and latency for network reliability evaluation in a stochastic computer network [J]. Journal of Industrial and Production Engineering, vol.31, no. 6, (2014), pp [9] L T o, Application of Fuzzy Mathematics in the Evaluation of Customer Satisfaction in Supermarket [ ], Journal of Capital Normal University, no. 3, (2015), pp [10] L Tao, Fuzzy Mathematics Evaluation based on University Network Risks [J]. Journal of Huaiyin Teachers College (Natural Science Edition), no. 2, (2015), pp [11] W ie, Analysis of Computer Network Security [J]. Guangxi Journal of Light Industry, no. 2, (2011), pp [12] X Zhe, On the Existing Problems and Countermeasures of the University Network Security [D]. (2012). [13] L Bingqi, The Factors Inlfuencing the Computer Network Security and Countermeasures [J]. Computer Engineering & Software, no. 3, (2014), pp [14] H Zhonggeng. Mathematical Modeling Methods and Application [M]. Beijing: Higher Education Press,( 2005). [15] S Jingwei, W Xinyi. Application of Comprehensive Evaluation for the Quality of the Physical and Chemical Laboratory by Fuzzy Mathematics [J]. Shanghai Journal of Preventive Medicine, vol. 6, no. 14, (2002), pp [16] Z Lijuan, W Qingxi n, Application of Fuzzy Analytic Hierarchy Process Model in Network Security Situation Assessment [J]. Computer Simulation, no. 12, (2011), pp [17] L T o, The Environment Impact Evaluation based on Urban Land Planning Project[J]. International Journal of Earth Sciences and Engineering, no. 2, (2015). 10 Copyright c 2016 SERSC
An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances
Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy
More informationResearch on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):593-598 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on supply chain risk evaluation based on
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis of results of CET 4 & CET 6 Based on AHP
More informationThe Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course
, pp.291-298 http://dx.doi.org/10.14257/ijmue.2015.10.9.30 The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course Xiaoyu Chen 1 and Lifang Qiao
More informationA Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service
Vol.8, No.3 (2014), pp.175-180 http://dx.doi.org/10.14257/ijsh.2014.8.3.16 A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Hong-Kyu Kwon 1 and Kwang-Kyu Seo 2* 1 Department
More informationA Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain
International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin
More informationModern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
More informationMULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process
MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process Business Intelligence and Decision Making Professor Jason Chen The analytical hierarchy process (AHP) is a systematic procedure
More informationResearch on e-commerce Security based on Risk Management Perspective
, pp. 153-162 http://dx.doi.org/10.14257/ijsia.2014.8.3.17 Research on e-commerce Security based on Risk Management Perspective Wu Yanyan School of Computer and Information Engineering Harbin University
More informationThe Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method
The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial
More informationModeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
More informationFuzzy Comprehensive Evaluation Enterprise Performance Management
Fuzzy Comprehensive Enterprise Performance Management Model Based on AHP Hunan Vocational College of Railway echnology,yuanjie2013@yeah.net, Zhuzhou, Hunan province, China Abstract Performance management
More informationOffer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone
Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone Contents Contents 1 2 3 4 5 6 7 Significance of SMEs in Urban Development SME Status Quo IT Capabilities
More informationConstruction of Early Risk Alarm Index System for Commercial Banks
DOI: 10.7763/IPEDR. 2012. V49. 23 Construction of Early Risk Alarm Index System for Commercial Banks Zheng Tian 1 and Zhang Li 2 1 Academic Adminstration Hangzhou Wangxiang Polytechnic,Hangzhou, P.R.China
More informationAdopting an Analytic Hierarchy Process to Select Internet Advertising Networks
Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks Chin-Tasi Lin 1), Pi-Fang Hsu 2) 1) Yuanpei Institute of Science and Technology, Department of Information Management, Taiwan
More informationResearch on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
More informationExploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
More informationResearch on Capability Assessment of IS Outsourcing Service Providers
, pp.291-298 http://dx.doi.org/10.14257/ijunesst.2015.8.6.28 Research on Capability Assessment of IS Outsourcing Service Providers Xinjun Li and Junyan Wang School of Economic and Management, Yantai University,
More informationChinese Automobile Brand International Marketing Target Market Selection Model Based on AHP
Chinese Automobile Brand International Marketing Target Market Selection Model Based on AHP Xiaoming-Tao School of Management Shanghai University of Engineering Science Shanghai, China Yubin-Qian Shanghai
More informationA solution for comprehensive network security
Applied mathematics in Engineering, Management and Technology 2 (6) 2014:22-26 www.amiemt-journal.com A solution for comprehensive network security Seyed Mehdi Mousavi Payam Noor University (PNU), IRAN
More informationProject Management Software Selection Using Analytic Hierarchy Process Method
International Journal of Applied Science and Technology Vol. 4, No. ; November 04 Project Management Software Selection Using Analytic Hierarchy Process Method Birgul Kutlu Professor Bogazici University
More informationAnalysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information
Journal of Computational Information Systems 9: 14 2013 5529 5534 Available at http://www.jofcis.com Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic
More informationProject Management Software Selection Using Analytic Hierarchy Process Method
Project Management Software Selection Using Analytic Hierarchy Process Method ISSN - 35-055 Sweety Sen (B.tech: Information Technology) Dronacharya College of Engineering Gurgaon, India Phone no. : 00343
More informationPerformance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model
Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model 1, 2 1 International School of Software, Wuhan University, Wuhan, China *2 School of Information
More informationANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL
Kardi Teknomo ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL Revoledu.com Table of Contents Analytic Hierarchy Process (AHP) Tutorial... 1 Multi Criteria Decision Making... 1 Cross Tabulation... 2 Evaluation
More informationThe Analytic Hierarchy Process. Danny Hahn
The Analytic Hierarchy Process Danny Hahn The Analytic Hierarchy Process (AHP) A Decision Support Tool developed in the 1970s by Thomas L. Saaty, an American mathematician, currently University Chair,
More informationCloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
More informationNetwork Security Evaluation Mould based on Multifactor Fuzzy
Network Security Evaluation Mould based on Multifactor Fuzzy Evaluation 1 Tao Wu, 2 Jun Ma, 3 Hang Zhang 1, Network Information Center, Hebei United University, Tangshan, China, happynat@163.com 2, Network
More informationAn Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
More informationGrey and Fuzzy Evaluation of Information System Disaster Recovery Capability
2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability Yuan Chunyang National Computer network
More informationStudy on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China zhangmei7596@163.com Abstract With
More informationHow To Perform An External Security Vulnerability Assessment Of An External Computer System
External Vulnerability Assessment -Executive Summary- Prepared for: ABC ORGANIZATION On March 9, 2008 Prepared by: AOS Security Solutions 1 of 5 Table of Contents Executive Summary... 3 Immediate Focus
More informationFault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationComparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) August 2015, PP 58-62 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Comparative Analysis of
More informationHow to do AHP analysis in Excel
How to do AHP analysis in Excel Khwanruthai BUNRUAMKAEW (D) Division of Spatial Information Science Graduate School of Life and Environmental Sciences University of Tsukuba ( March 1 st, 01) The Analytical
More informationThe Television Shopping Service Model Based on HD Interactive TV Platform
, pp. 195-204 http://dx.doi.org/10.14257/ijunesst.2014.7.6.17 The Television Shopping Service Model Based on HD Interactive TV Platform Mengke Yang a and Jianqiu Zeng b Beijing University of Posts and
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
More informationStudy of the Decision-Making Model of Outsourcing Service Provider Selection
Study of the Decision-Making Model of Outsourcing Service Provider Selection En-lin Li Post-doctoral Research Working Station of North-east Asia Outsourcing Research Center, Harbin University of Commerce,
More informationA Research on Security Awareness and Countermeasures for the Single Server
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
More informationOPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia
OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia Abstract. The main aim of Solvency II framework is to establish
More information1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014
1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu
More informationOn Video Content Delivery in Wireless Environments
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.65.20 On Video Content Delivery in Wireless Environments Po-Jen Chuang and Hang-Li Chen Department of Electrical Engineering Tamkang University Tamsui, New
More informationPerformance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process
Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Y. H. Liang Department of Information Management, I-SHOU
More informationHIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
More informationSupplier Performance Evaluation and Selection in the Herbal Industry
Supplier Performance Evaluation and Selection in the Herbal Industry Rashmi Kulshrestha Research Scholar Ranbaxy Research Laboratories Ltd. Gurgaon (Haryana), India E-mail : rashmi.kulshreshtha@ranbaxy.com
More informationA Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
More informationTHE ANALYTIC HIERARCHY PROCESS (AHP)
THE ANALYTIC HIERARCHY PROCESS (AHP) INTRODUCTION The Analytic Hierarchy Process (AHP) is due to Saaty (1980) and is often referred to, eponymously, as the Saaty method. It is popular and widely used,
More informationCrime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
More informationOpen Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
More informationUSING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS: SOME CHALLENGES
Published in: Inter l Journal of Industrial Engineering: Applications and Practice, Vol. 2, No. 1, pp. 35-44, 1995. 1 USING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS:
More informationCHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES
49 CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES 3.1 INTRODUCTION Key Performance Indicators (KPIs) is means for assessment of an organisations current position
More informationResearch of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers in Hsinchu Area Taiwan
usiness, 2010, 2, 348-353 doi:10.4236/ib.2010.24045 Published Online December 2010 (http://www.scirp.org/journal/ib) Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers
More informationComparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University
More informationEstimation of Unknown Comparisons in Incomplete AHP and It s Compensation
Estimation of Unknown Comparisons in Incomplete AHP and It s Compensation ISSN 0386-1678 Report of the Research Institute of Industrial Technology, Nihon University Number 77, 2005 Estimation of Unknown
More informationAnalytic Hierarchy Process-based Social Public Sports Facility Utilization and Development Research
Send Orders for Reprints to reprints@benthamscience.ae The Open ybernetics & Systemics Journal, 0, 9, - Open Access Analytic Hierarchy Process-based Social Public Sports Facility Utilization and Development
More informationUPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
More informationA Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationEvaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
More informationBest Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
More informationSecurity & SMEs. An Introduction by Jan Gessin. Introduction to the problem
Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online
More informationDesign of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
More informationOn-line Payment and Security of E-commerce
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
More informationResearch on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing
, pp.287-296 http://dx.doi.org/10.14257/ijsia.2015.9.10.26 Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing Yuqiu
More informationNetwork Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
More informationStudy of data structure and algorithm design teaching reform based on CDIO model
Study of data structure and algorithm design teaching reform based on CDIO model Li tongyan, Fu lin (Chengdu University of Information Technology, 610225, China) ABSTRACT CDIO is a new and innovative engineering
More informationAnalysis on the Present Condition Differences between the Specialty- Education of Sino-American Construction Engineering Management
I.J. Education and Management Engineering 2012, 6, 56-60 Published Online July 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2012.06.10 Available online at http://www.mecs-press.net/ijeme
More informationThe Application of AHP in Biotechnology Industry with ERP KSF Implementation
The Application of AHP in Biotechnology Industry with KSF Implementation Ming-Lang Wang 1, H. F. Lin 2, K. W. Wang 2 1 Department of Industrial Management, Chung Hua University, Hsinchu, Taiwan 2 Department
More informationResearch on the Effect of E-Commerce Industrial Development on the Promotion of New Urbanization
Vol. (UNESST 214), pp.54-5 http://dx.doi.org/1.1425/astl.214..11 Research on the Effect of E-Commerce Industrial Development on the Promotion of New Urbanization Li Jia li, Cheng Tao Harbin University
More informationGigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
More informationToward Secure Distribution of Electronic Health Records: Quantitative feasibility study on secure E-mail systems for sharing patient records
J Med Dent Sci 2005; 52: 229 236 Original Article Toward Secure Distribution of Electronic Health Records: Quantitative feasibility study on secure E-mail systems for sharing patient records Yuichiro Gomi
More informationDesign of Hospital EMR Management System
International Journal of u-and e-service, Science and Technology, pp.341-348 http://dx.doi.org/10.14257/ijunnesst.2014.7.5.30 Design of Hospital EMR Management System Hongfeng He and Yixin Yan * Harbin
More informationCredit Risk Comprehensive Evaluation Method for Online Trading
Credit Risk Comprehensive Evaluation Method for Online Trading Company 1 *1, Corresponding Author School of Economics and Management, Beijing Forestry University, fankun@bjfu.edu.cn Abstract A new comprehensive
More informationA Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology
, pp. 217-226 http://dx.doi.org/10.14257/ijsia.2015.9.6.21 A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology JeongBeom Kim Professor,
More informationMaruleng Local Municipality
Maruleng Local Municipality. 22 November 2011 1 Version Control Version Date Author(s) Details 1.1 23/03/2012 Masilo Modiba New Policy 2 Contents ICT Firewall Policy 1 Version Control.2 1. Introduction.....4
More informationStudy of Lightning Damage Risk Assessment Method for Power Grid
Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid
More informationDesign and Implementation of the Self-Management Travel System
Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China 116025 Abstract Through skeleton system,
More informationThe Research of Data Management in the University Human Resource Systems
, pp.61-65 http://dx.doi.org/10.14257/astl.2014.53.15 The Research of Data in the University Human Resource Systems Ye FAN, Shaoyun GUAN, Honglue LV Harbin University of Commerce gsyj91@163.com Abstract.
More informationHigh Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
More informationA Multi-attribute Decision Making Approach for Resource Allocation in Software Projects
A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects A. Ejnioui, C. E. Otero, and L. D. Otero 2 Information Technology, University of South Florida Lakeland, Lakeland,
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationResearch on the Comprehensive Evaluation of Business Intelligence System Based on BP Neural Network
Available online at www.sciencedirect.com Systems Engineering Procedia 00 (2011) 000 000 Systems Engineering Procedia 4 (2012) 275 281 Systems Engineering Procedia www.elsevier.com/locate/procedia 2 nd
More informationApplication of the Multi Criteria Decision Making Methods for Project Selection
Universal Journal of Management 3(1): 15-20, 2015 DOI: 10.13189/ujm.2015.030103 http://www.hrpub.org Application of the Multi Criteria Decision Making Methods for Project Selection Prapawan Pangsri Faculty
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationResearch on the Course of Network Performance Testing and Analysis
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong
More informationResearch on the Facilitation of E-commerce Technology Development on New-type Urbanization Construction in the Internet of Things Era
, pp.23-238 http://dx.doi.org/.4257/ijunesst.25.8.3.22 Research on the Facilitation of E-commerce Technology Development on New-type Urbanization Construction in the Internet of Things Era Li Jia li and
More informationFexible QoS Management of Web Services Orchestrations
Fexible QoS Management of Web Services Orchestrations Ajay Kattepur 1 1 Equipe ARLES, INRIA Paris-Rocquencourt, France. Collaborators: Albert Benveniste (INRIA), Claude Jard (INRIA / Uni. Nantes), Sidney
More informationConstruction of Information Disaster Recovery for Hospitals
148 Construction of Information Disaster Recovery for Hospitals Juan Xu School of Information, Yunnan University of Finance and Economics, Yunnan 650221, China E-mail: Xujuan@ynufe.edu.cn Abstract When
More informationHow To Study The Effects Of A Customer Relationship Management
International Review of Management and Marketing Vol. 4, No. 2, 2014, pp.167-174 ISSN: 2146-4405 www.econjournals.com Comparison of CRM Programs Basing on Improving Customer Profitability: Using the AHP
More informationVendor Evaluation and Rating Using Analytical Hierarchy Process
Vendor Evaluation and Rating Using Analytical Hierarchy Process Kurian John, Vinod Yeldho Baby, Georgekutty S.Mangalathu Abstract -Vendor evaluation is a system for recording and ranking the performance
More informationTABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
More informationDecision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process
Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Nina Begičević University of Zagreb, Faculty of Organization and Informatics, Pavlinska 2, Varaždin nina.begicevic@foi.hr
More informationUSING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO
USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORIZE PROJECTS IN A PORTFOLIO Ricardo Viana Vargas, MSc, IPMA-B, PMP Professor Fundação Getúlio Vargas (FGV) Brasil Professor Fundação Instituto
More informationModule 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration
Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network
More informationAnalysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey
, pp.65-74 http://dx.doi.org/10.14257/ijunesst.2015.8.10.07 Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey Haewon Byeon
More informationThe Analytic Network Process
The Analytic Network Process Thomas L. Saaty University of Pittsburgh saaty@katz.pitt.edu Abstract The Analytic Network Process (ANP) is a generalization of the Analytic Hierarchy Process (AHP). The basic
More informationOnline Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective
, pp.323-332 http://dx.doi.org/10.14257/ijsia.2015.9.10.29 Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective Hui Yang and Yajuan Zhang*
More informationE-business Management System Based on Coordinated Center for Dealer
The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 533 E-business Based on Coordinated Center for Dealer Ding Zhang 1, Jingwen An 1, Zhongqing Cheng 2 1 School of Management,
More informationDevelopment of an Enhanced Web-based Automatic Customer Service System
Development of an Enhanced Web-based Automatic Customer Service System Ji-Wei Wu, Chih-Chang Chang Wei and Judy C.R. Tseng Department of Computer Science and Information Engineering Chung Hua University
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
More information